Tight Bounds for Protocols with Hybrid Security.
Matthias FitziDominik RaubPublished in: IACR Cryptol. ePrint Arch. (2009)
Keyphrases
- tight bounds
- upper bound
- security protocols
- security properties
- key agreement protocol
- cryptographic protocols
- communication protocols
- security services
- intrusion detection
- information security
- security requirements
- secure multiparty computation
- authentication protocol
- messages exchanged
- security analysis
- key distribution
- key exchange
- key management
- security issues
- network security
- key establishment
- security systems
- security level
- computer security
- access control
- lower bound
- application level
- security policies
- smart card
- contractual obligations
- security threats
- encryption scheme
- medium access control
- homomorphic encryption
- public key cryptosystems